{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:19:30Z","timestamp":1725538770719},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642317231"},{"type":"electronic","value":"9783642317248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31724-8_52","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T15:32:34Z","timestamp":1342884754000},"page":"499-508","source":"Crossref","is-referenced-by-count":1,"title":["A Model for Assessing the Risk of Revealing Shared Secrets in Social Networks"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Troiano","sequence":"first","affiliation":[]},{"given":"Irene","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Luis J.","family":"Rodr\u00edguez-Mu\u00f1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Beach, A., Gartrell, M., Han, R.: Social-K: Real-time K-anonymity guarantees for social network applications. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 600\u2013606. IEEE (March 2010)","DOI":"10.1109\/PERCOMW.2010.5470507"},{"key":"52_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-01718-6_4","volume-title":"Privacy, Security, and Trust in KDD","author":"A. Campan","year":"2009","unstructured":"Campan, A., Truta, T.M.: Data and Structural k-Anonymity in Social Networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol.\u00a05456, pp. 33\u201354. Springer, Heidelberg (2009)"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Faigle, U., Grabisch, M.: A discrete choquet integral for ordered systems. CoRR, abs\/1102.1340 (2011)","DOI":"10.1016\/j.fss.2010.10.003"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.: A survey of security issue in multi-agent systems. Artificial Intelligence Review, 1\u201322 (2011), doi:10.1007\/s10462-011-9228-8","DOI":"10.1007\/s10462-011-9228-8"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of IEEE International Conference on Data Engineering, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"52_CR6","unstructured":"Liu, K., Das, K., Grandison, T., Kargupta, H.: Privacy-preserving data analysis on graphs and social networks"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"3","key":"52_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.fss.2005.05.033","volume":"156","author":"R. Mesiar","year":"2005","unstructured":"Mesiar, R.: Fuzzy measures and integrals. Fuzzy Sets and Systems\u00a0156(3), 365\u2013370 (2005)","journal-title":"Fuzzy Sets and Systems"},{"key":"52_CR9","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013, 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"11","key":"52_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"52_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"G.J. Simmons","year":"1990","unstructured":"Simmons, G.J.: How to (Really) Share a Secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 390\u2013448. Springer, Heidelberg (1990)"},{"key":"52_CR12","unstructured":"Sugeno, M.: Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology (1974)"},{"issue":"5","key":"52_CR13","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"52_CR14","unstructured":"Torra, V., Domingo-Ferrer, J.: Disclosure control methods and information loss for microdata, pp. 91\u2013110. Elsevier (2001)"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Torra, V., Narukawa, Y.: Modeling decisions - information fusion and aggregation operators. Springer (2007)","DOI":"10.1016\/j.ijar.2007.01.001"},{"key":"52_CR16","doi-asserted-by":"crossref","unstructured":"Wong, R.C., Li, J., Fu, A.W., Wang, K.: (\u03b1,k) Anonymity: An Enhanced k -Anonymity Model for Privacy-Preserving Data Publishing, pp. 754\u2013759. ACM (2006)","DOI":"10.1145\/1150402.1150499"},{"key":"52_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-01307-2_6","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"X. Ying","year":"2009","unstructured":"Ying, X., Wu, X.: On Link Privacy in Randomizing Social Networks. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS, vol.\u00a05476, pp. 28\u201339. Springer, Heidelberg (2009)"},{"issue":"3","key":"52_CR18","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10115-010-0353-5","volume":"28","author":"X. Ying","year":"2011","unstructured":"Ying, X., Wu, X.: On link privacy in randomizing social networks. Knowl. Inf. Syst.\u00a028(3), 645\u2013663 (2011)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"52_CR19","first-page":"1","volume":"28","author":"B. Zhou","year":"2010","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems\u00a028(1), 1\u201338 (2010)","journal-title":"Knowledge and Information Systems"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31724-8_52.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T15:47:26Z","timestamp":1687621646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31724-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642317231","9783642317248"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31724-8_52","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}